Presentation is loading. Please wait.

Presentation is loading. Please wait.

Texas Christian UniversityTechnology Resources COMPUTER HOME.

Similar presentations

Presentation on theme: "Texas Christian UniversityTechnology Resources COMPUTER HOME."— Presentation transcript:

1 Texas Christian UniversityTechnology Resources COMPUTER HOME

2 TCU Information Security Services Overview Critical Patches Anti-Virus Software Anti-Spyware Software Internet Firewall Security Backup Your Computer Use Strong Passwords Wireless Security Etcetera

3 TCU Information Security Services Critical Patches It is critical to keep your software up-to-date Operating system Anti-virus and anti-spyware Applications including browsers, Adobe Acrobat, Java, Flash Newest versions contain fixes for discovered vulnerabilities Enable automatic update features in OS and application software Windows – Control Panel Mac OSX – System Preferences

4 TCU Information Security Services Anti-virus Software Anti-virus software is used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware Wikipedia Anti-virus software offers ongoing protection, daily scans, daily updates. To be effective virus definitions must be updated routinely. Norton, Trend Micro, McAfee, AVG, Sophos, Eeye, also included in internet security packages.

5 TCU Information Security Services Anti-Spyware Software Protects your computer from malicious spyware. Spyware may monitor your online activities and collect personal information while you surf the web. Periodically scans your computer for spyware. Must also be kept up-to-date Ad-Adware, Spybot, also included in internet security packages

6 TCU Information Security Services Internet Firewall Anti-virus and anti-spyware products inspect files on your computer, in incoming and outgoing , and on removable media. Firewall software and/or hardware monitors the communications between your computer and the outside world (the Internet). Firewalls prevent unauthorized access to or from a private network (i.e., your home computer).

7 TCU Information Security Services Internet Firewall (continued) You can implement a firewall in either hardware or software form, or a combination of both. Hardware Firewall Router (wired or wireless), i.e., Linksys DSL Modem, Gateway Software Firewall Built-in Windows Firewall Only stops inbound traffic, does not check outbound Mac OSX 10.2 and later also has an built-in firewall Part of an internet security package

8 TCU Information Security Services Internet Security Packages Some commercial internet security packages include anti-virus, anti-software and firewall software. Norton, Trend Micro, McAfee, Sophos, EEye, ESET, AVG

9 TCU Information Security Services Security Phishing Spam Attachments

10 TCU Information Security Services Phishing Phishing is an illegal activity that uses social engineering techniques to manipulate people into giving out personal information. A highly targeted version of a phishing scam is spear phishing.

11 TCU Information Security Services Phishing (continued) Characteristics of phishing s Unsolicited request for personal information Username, userid, id, identity Password Social security number Birthdate Generic greetings Contains an ultimatum Grammatical errors Content appears genuine

12 TCU Information Security Services Phishing techniques Link manipulation Technical deception designed to make a link in an and the spoofed website it leads to, appear to belong to the spoofed organization. Spoofed website Looks almost exactly like the real thing Website forgery A spoofed website that uses JavaScript to alter the address bar to appear legitimate. Filter evasion Misspelled words and images instead of text are used to evade anti- phishing filters.

13 A Recent TCU Phishing Link manipulation

14 Fake Website Look between first double // and first single / - thats NOT TCU No https

15 Real Website That is TCUSecure

16 Watch out for links in s. Do not click on them Type the link directly into web browser Learn to spot non-legitimate web sites Look at the address between the // and the first / - it should end with the company you expect Fake: Real:… Is it secure? https in the address Yellow lock icon Avoid being Phished!

17 TCU Information Security Services Avoid being Phished (continued) Greet or phone calls seeking personal information with skepticism. If you think it may be legitimate, call customer service number provided when account was opened. Be leery of alarming statements that urge you to respond immediately. Do NOT reply to phishing s. OnGuard Online Phishy Home Video home.aspx

18 TCU Information Security Services Avoid being Phished (continued) TCU Technology Resources, including the computer help desk and information security services will NEVER ask you for your password via , the phone or in person. When TCU upgrades its computer or systems we will NEVER send a link inside an which will go to a website requesting that you login or enter your username and password.

19 TCU Information Security Services Spam Spam is anonymous, unsolicited junk sent indiscriminately to huge numbers of recipients. Do not open that is obviously Spam. If you do open spam, do not click on any links.

20 TCU Information Security Services Attachments Computer viruses and other malicious software are often spread through attachments. If a file attached to an contains a virus, it is often launched when you open (or double-click) the attachment. Dont open unexpected attachments.

21 TCU Information Security Services Backup Your Computer Be prepared for the worst by backing up critical data and keeping backups in a separate, secure location. Use supplemental hard drives, CDs/DVDs or flash drives Backup data, files, pictures

22 TCU Information Security Services Use Strong Passwords Strong passwords At least one alphabetic, one numeric and one special character At least 7 characters long Mixed case Not similar to other passwords or your name Not found in the dictionary Lets test some passwords:

23 TCU Information Security Services Wireless Security Change the administrator username and password on your wireless hardware. Use WPA2 encryption to secure communication between your computer and your wireless access point. Change the Default SSID (default name of the your wireless network – i.e., Linksys devices are normally linksys) Run setup wizard that comes with wireless router. Restrict which computers can access your network.

24 TCU Information Security Services Wireless Security continued OnGuard Online Wireless Video secuirty-yul-kwon.aspx

25 TCU Information Security Services Etcetera Supervise Children Teach computer security Use monitoring software Turn off computer when not using it Warning – if off for weeks it wont get updates. Force updates when you turn it back on. Use FireFox instead of Internet Explorer Turn on Master Password Beware of freeware or shareware – it may be spyware

26 TCU Information Security Services Etcetera (continued) If you need to access the TCU network from home, use VPN with Remote Desktop (Windows) or Screensharing (Mac) When getting rid of an old computer, even if the hard drive is broken, drill holes through it. Beware of public computer access Wireless hotspots – not secure, dont require encryption. You may want to use TCU VPN. Kiosks or public computers – not secure, key logging software may be installed.

27 TCU Information Security Services Recap Critical Patches – keep everything up-to-date! Anti-virus, anti-spyware, firewall Recommendation – all inclusive internet security package security Watch for links in s and learn to spot non- legitimate web sites Use strong passwords Wireless security

28 TCU Information Security Services Resources TCU Computer Help Desk Location: Mary Couts Burnett Library, first floor Information Security Services

Download ppt "Texas Christian UniversityTechnology Resources COMPUTER HOME."

Similar presentations

Ads by Google